CVE-2023-32637

9.8 CRITICAL

📋 TL;DR

CVE-2023-32637 is a critical vulnerability in GBrowse that allows unauthenticated remote code execution. Attackers can upload malicious files through the web interface, which are then accessible via unauthenticated web requests, enabling arbitrary code execution on the server. This affects all GBrowse installations with file upload functionality enabled.

💻 Affected Systems

Products:
  • GBrowse
Versions: All versions prior to patched version (specific version not provided in references)
Operating Systems: All operating systems running GBrowse
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when file upload functionality is enabled. GBrowse installations without file uploads may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Attackers gain shell access to the server, install cryptocurrency miners or botnet clients, and exfiltrate sensitive genomic data.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the GBrowse server only, with quick detection and containment.

🌐 Internet-Facing: HIGH - The vulnerability requires only web access and file upload capability, making internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internal instances are at significant risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - upload malicious file and access it via web request. No authentication required for file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - check GMOD advisory

Vendor Advisory: http://gmod.org/wiki/GBrowse

Restart Required: Yes

Instructions:

1. Check GMOD advisory for latest patched version. 2. Backup configuration and data. 3. Update GBrowse to patched version. 4. Restart web server and GBrowse services. 5. Verify file upload restrictions are properly implemented.

🔧 Temporary Workarounds

Disable File Uploads

all

Completely disable file upload functionality in GBrowse configuration

Edit GBrowse configuration to remove or comment out file upload settings

Web Server File Type Restrictions

linux

Configure web server to block access to uploaded executable files

Add location block in nginx: location ~* \.(php|pl|py|sh)$ { deny all; }
Add to Apache .htaccess: <FilesMatch "\.(php|pl|py|sh)$"> Order Allow,Deny Deny from all </FilesMatch>

🧯 If You Can't Patch

  • Isolate GBrowse server in separate network segment with strict firewall rules
  • Implement web application firewall (WAF) with file upload filtering and RCE protection rules

🔍 How to Verify

Check if Vulnerable:

Test if you can upload a file through GBrowse interface and then access it via direct URL without authentication

Check Version:

Check GBrowse version in web interface or configuration files

Verify Fix Applied:

Attempt to upload and access malicious file - should be blocked or inaccessible

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to GBrowse
  • Access to uploaded files with suspicious extensions (.php, .pl, .py)
  • Web server errors from attempted code execution

Network Indicators:

  • Outbound connections from GBrowse server to unknown IPs
  • Unusual traffic patterns from GBrowse server

SIEM Query:

source="gbrowse_logs" AND (event="file_upload" OR uri="*.php" OR uri="*.pl" OR uri="*.py")

🔗 References

📤 Share & Export